Tags


Latest Posts


Latest Comments


Authors

Blog

The rise of DRaaS

Posted by Stefan Haase | 1 Dec 2014, 16:24 PM

stefan-haase.jpg

In this blog, Stefan Haase explains how Disaster Recovery as a Service (DRaaS) can help customers avoid the headache of getting their business back up and running in the event of a data loss. He explains how tailored Cloud services can protect against the whole stack to provide a 'pay as you go' DR service.

read more

How SMEs can unlock the public sector’s collaborative future

Posted by Mark Hall | 19 Nov 2014, 09:22 AM

mark-hall.jpg

There is so much more potential for IT as an enabler in the Public Sector. However, even if the government is ready to move away from its traditional ‘silo’ mindset, the IT infrastructure isn’t. The advent of G-Cloud and the government's Cloud first strategy has allowed SMEs to compete for public sector contracts. This has not only driven competition, which can only be good for the government, but the resulting move to Cloud services offers the benefits of improved agility and the flexibility to share data and collaborate more effectively.

read more

How to Implement a Strong Password Policy

Posted by Stuart Brown | 18 Nov 2014, 15:52 PM

stuart-brown.jpg

Stuart Brown looks at why computer security is important for your business and how to staff password policies. Stuart gives a broad outline of the factors that business owners need to consider when securing their business data.

read more

A Guide to Creating the Perfect Password

Posted by Stuart Brown | 13 Nov 2014, 12:41 PM

stuart-brown.jpg

How do you educate your employees to ensure that account details aren’t hacked due to simpler/more commonly used passwords? Stuart Brown looks at Redcentric’s recently launched security e-books which takes you through the basics of computer security.

read more

The trouble with telephony...

Posted by Paul Storey | 10 Nov 2014, 10:53 AM

paul-storey.jpg

At a time when businesses are looking to streamline their IT costs, Redcentric's Paul Storey suggest that it might also be time for those same businesses to look at their telephony costs and see how the 'Cloud' can also help to not only reduce costs but provide a better quality of service.

read more

Business Impact Levels

Posted by Mark Hall | 4 Nov 2014, 11:02 AM

mark-hall.jpg

Mark Hall discusses BIL (Business Impact Levels) security controls, looking at what the levels mean, the type of data classified at each level, and the difficulties faced with the BIL data classification model. As the government moves away from the current BIL system to a new three tiered model for data labeling, Mark discusses how this simplifies data classification and allows SME providers the opportunity to compete for these government contracts.

read more

Stairway to SQL Server High Availability (HA) solutions – level 1: Overview of all SQL Server’s HA offerings

Posted by Louis Ozougwu – MCITP - OCP - Oracle RAC | 27 Oct 2014, 18:12 PM

louis-ozougwu.jpg

This is the first in a series of blogs by Louis Ozougwu, Senior Database Consultant at Redcentric. Louis looks to unmask the various SQL Server High Availability solutions. This first blog in the series presents an overview of the SQL Server High Availability solutions currently on offer.

read more

Blurred lines – who owns the data on your mobile phone?

Posted by Richard Allgate | 20 Oct 2014, 15:37 PM

richard-allgate.jpg

Redcentric’s mobile specialist, Richard Allgate, looks at the ownership of data on a mobile device in a BYOD scenario and an example on how personal data on a mobile device could be wiped in a MDM situation. Richard looks at how to plan for such scenarios within a corporate BYOD policy and solutions to ensure that business and personal data are ring fenced.

read more

Managing Malware - part 2

Posted by Stuart Brown | 15 Oct 2014, 16:40 PM

stuart-brown.jpg

As the Advance Persistent Threat (APT) landscape continues to evolve, even small companies are now at risk. In the second of his two blogs, Redcentric’s Director of Consulting Stuart Brown looks at the steps SMEs can take to improve their security.

read more

Managing malware – part 1

Posted by Stuart Brown | 8 Oct 2014, 15:52 PM

stuart-brown.jpg

As the Advance Persistent Threat (APT) landscape continues to evolve, even small companies are now at risk. In a series of two blogs, Redcentric’s Principal Solutions Architect Stuart Brown examines why traditional approaches to network security aren’t working and offers advice on what can be done to reduce the threat to your business.

read more

Time to level with you about government IT procurement

Posted by Mark Hall | 3 Oct 2014, 15:36 PM

mark-hall.jpg

Mark Hall discusses the changes in government IT procurement and how the G-Cloud framework has enabled SME technology companies to compete on a level playing field against the traditional monoliths. He looks at what it means for SME’s and the benefits to public sector organisations when contracting with an SME.

read more

Is Apple playing catch up?

Posted by Richard Allgate | 30 Sep 2014, 12:36 PM

richard-allgate.jpg

Richard Allgate looks at the recent announcements made by Apple from their new phones, OS upgrades and consumer reactions to the iCloud security breach. He compares the latest offering from Apple to the Android market, discusses the new capabilities and the benefits they can provide to the enterprise.

read more

Shadow IT - Why its an opportunity not a threat

Posted by Mark Hall | 29 Sep 2014, 15:44 PM

mark-hall.jpg

Although dealing with Shadow IT is seen as a priority for CIO's at many large enterprises, it is not a new problem but it is a problem that is growing rapidly for a number of reasons. In this blog, Mark Hall looks at why the issue is growing rapidly and what can be done to ensure the IT needs of employees are being met.

read more

Its memory isn’t what it used to be

Posted by Ian Rhodes | 26 Sep 2014, 11:50 AM

ian-rhodes.jpg

As news broke last month that the 512K bug might mean data disruption due to the net's growth and old hardware is upgraded to handle todays Internet demands, Ian Rhodes looks at times where this has happened before and how the industry is developing to support internet growth.

read more

Public Sector IT: Aligned to innovation

Posted by Mark Hall | 24 Sep 2014, 13:48 PM

mark-hall.jpg

In his latest blog, Mark Hall, Divisional Director of Public Sector for Redcentric, looks at how the public sector IT landscape has changed over the last decade and how SMEs like Redcentric are reaping the rewards from the growth of Government initiatives such as G-Cloud and the Public Sector Network.

read more

N3 commercial aggregator status: something to shout about

Posted by Mark Hall | 15 Sep 2014, 15:52 PM

mark-hall.jpg

In his latest blog, Mark Hall, Redcentric's Divisional Director of Public Sector, and resident N3 expert, explains why being only one of two Service Providers to be granted N3 commercial aggregator status by the Health and Social Care Information Centre (HSCIC) is definitely worth shouting about.

read more

Seeing through the fog

Posted by Simon Michie | 9 Sep 2014, 17:48 PM

homepage-update.jpg

As the term 'fog computing' enters the computing industry our Head of Cloud, Simon Michie, takes a looks at what it means. As the Internet of Things (IoT) increase should data processing be taken by the devices around the network edge or within the Cloud? What challenges do businesses face by these new issues and how can fog computing be used to their advantage to resolve these issues.

read more

Organisations need to consider the full cloud lifecycle

Posted by Simon Michie | 28 Aug 2014, 12:40 PM

homepage-update.jpg

In his latest blog, Simon Michie, Head of Cloud, discusses the importance in considering the entire cloud lifecycle when a business is looking at migrating to cloud services. Simon also looks at what can be done by Cloud Service Providers to support clients from the beginning to the end of their cloud journey.

read more

Talking up a Storm - Part three

Posted by Paul Storey | 22 Aug 2014, 11:55 AM

paul-storey.jpg

In the final blog in this three part series, Paul Storey, Head of Voice at Redcentric, looks at the growing popularity of collaborative tools within the workplace and how it shouldn't be seen as the end of VoIP solutions.

read more

Is corporate mobile security the new black?

Posted by Richard Allgate | 14 Aug 2014, 16:23 PM

richard-allgate.jpg

Redcentric’s mobile specialist, Richard Allgate, gives his thoughts on the recently launched Blackphone and its impact on the business world marketplace. With BYOD becoming an increasing topic within IT departments Richard discusses if security should be centered on the device, the endpoint and its user or on the linked corporate network.

read more